Lucene search

K
attackerkbAttackerKBAKB:2C015E85-6311-4F7F-B9A0-11DE24C4089C
HistoryJan 30, 2023 - 12:00 a.m.

CVE-2023-0266

2023-01-3000:00:00
attackerkb.com
13

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

34.1%

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

Recent assessments:

anti00te at April 03, 2023 5:26pm UTC reported:

Google’s Threat Analysis Group (TAG) released an advisory regarding zero-day vulnerabilities in Android, iOS, and Chromium-based browsers that could allow a threat actor to spy on affected devices. Threat actors targeted users via SMS phishing messages. The SMS contained a URL shortener (bit[.]ly) that delivered the exploit and redirected the victim to a spoof Variston website. The payload is a C++ malware containing functions that steal data from messaging platforms and browser applications. Users are encouraged to update their devices’ applications, firmware, and operating systems to prevent further exploitation of unpatched systems.

Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 0

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

34.1%